📄️ Can I Copy Instance Details?
Actions:
📄️ Different View of Attack Surface Page
RHL ASM Platform is designed to manage attack surfaces by detecting and safeguarding against external threats that could potentially harm an organization. This platform enables users to identify security vulnerabilities and assess areas of risk. By conducting continuous analysis, it can detect changes in the attack surface, thereby reducing the likelihood of cyberattacks. By highlighting potential attack surfaces, the platform helps mitigate security breaches.
📄️ Does the Platform Support an API?
Yes, the RHL ASM Platform provides a Public API that allows seamless integration with your internal systems. This API enables secure data retrieval between the platform and your applications.
📄️ How can I track a reported security risk?
Managing security vulnerabilities can become overwhelming depending on the size of an organization's digital footprint and its existing security practices. To streamline this process, the RHL ASM Platform provides the Issue Tracker module.
📄️ How to Configure Notification & Ticketing Rules?
The Notification & Ticketing Rules module in the RHL ASM Platform allows you to define custom rules to receive alerts or raise tickets based on specific events. You can configure these rules for categories like security risks, third‑party assets, data leaks, and more.
📄️ How to Export All Issues from Tracker to Jira Project?
What is Jira?
📄️ How to Export Results?
- In the left sidebar, expand Reports and click Reports.
📄️ How to Manually Tag Assets?
- Go to Actions in the Asset Inventory section under the Attack Surface tab.
📄️ How to Mute Any Instance?
Actions to mute assets and their associated ports and security risks
📄️ How to Start My First Scan?
Starting your initial scan requires your organization to meet two key criteria:
📄️ How to Update Domains?
- To access the Seed Information feature, go to the Settings menu and select the corresponding option.
📄️ How to Use the Attack Surface Page?
RHL ASM Platform is designed to manage attack surfaces by detecting all assets associated with your organization to protect them from external threats. By utilizing the platform, you can effectively identify security vulnerabilities and gain insights into areas that pose risks. Through continuous analysis, the platform can detect changes in the attack surface, helping reduce the risk of cyberattacks.
📄️ How to Use Data Leaks Page?
A data leak (also known as a data breach) refers to an incident where confidential or sensitive information is accessed, viewed, stolen, or released without authorization. Data leaks can occur in various forms—both digital and physical—and can affect individuals, organizations, or government entities.
📄️ How to Use Filters on Asset Inventory Page?
The Asset Inventory section displays all identified assets in a tabular format. Each asset is listed with relevant details such as asset type, tags, technology used (tech), number of vulnerabilities, severity level, and first and last seen dates.
📄️ How to Use Filters on the Attack Surface Page?
The Attack Surface page provides powerful filtering options to help you efficiently manage and analyze your discovered assets. Filters are available in both the Asset Exposure and Asset Inventory sections.
📄️ How to Use the Security Risk Page?
The RHL ASM Platform is designed to identify security vulnerabilities across your organization's assets. Prompt remediation of these risks is crucial, as they can lead to data breaches and other cyber threats. To aid in swift detection, the platform offers a comprehensive set of predefined security checks.
📄️ Platform API Documentation
RHL ASM Platform offers a Public API that enables seamless integration with third-party applications. This API serves as an interface provided by the platform owner to its clients, allowing the exchange of specific information between different systems.
📄️ Setting Up Customized DL Email Delivery
To receive email notifications from the RHL ASM Platform, add email addresses to the Email distribution list (DL) section within Integrations.
📄️ Setting Up Permissions for AWS Integration
To extract resources from the client side, the RHL ASM Platform requires users to follow the steps below to grant necessary permissions. The platform performs comprehensive and non-comprehensive scans based on the permissions provided.
📄️ What Are Third‑Party Assets?
Third‑party assets refer to external resources, services, or applications used by an organization to support its business operations or deliver value to customers. These assets are not owned or directly managed by the organization but are provided by third‑party vendors or service providers. They may be used with or without a formal agreement in place.
📄️ What Do You Mean by 'New' and 'Mitigated' Entities?
New Entities
📄️ What Does 'Mute Instance' Mean?
When a user wants the system to ignore a specific instance, they can mute it. This action is typically taken when an instance is deemed irrelevant, intentional, or not a threat to the organization.
📄️ What Does the Scan State Signify?
The scan state represents the current condition of an organization's scan process.
📄️ What Information Is Available in the Dashboard?
The RHL ASM Platform dashboard provides a consolidated, at‑a‑glance view of your organization’s external exposure, detections, and trends.
📄️ What is a Data Leak?
Data leaks refer to the unintentional disclosure of sensitive or confidential information.
📄️ What is a Security Risk?
Security risks refer to weaknesses or vulnerabilities present in identified assets. Addressing these risks promptly is essential to prevent data breaches and other cybersecurity threats.
📄️ What Is the Attack Surface Page?
The RHL ASM Platform is designed to manage and protect an organization's attack surface by discovering and addressing potential vulnerabilities that could be exploited in external attacks. It enables continuous monitoring and analysis of assets, allowing organizations to proactively identify and remediate changes or exposures, thereby reducing the risk of cyberattacks.
📄️ What Are First Seen and Last Seen Dates?
The terms "First Seen" and "Last Seen" are commonly used in cybersecurity and data protection to indicate the timeline of detection and observation of assets, data leaks, or security risks during scanning or monitoring processes.
📄️ What is the Utility of the Screenshot Page?
The Screenshot page provides visual evidence of unexpected responses or content observed on various ports of discovered assets. These screenshots help in quickly identifying potential misconfigurations or exposed services.
📄️ Where Can I Find Details About a Security Risk / Vulnerability?
A security risk is any potential threat or vulnerability that could compromise the confidentiality, integrity, or availability of an asset.
📄️ Where Can I Find Historical Reports?
All previously generated reports are available under the Reports section.
📄️ Where Can I Find Instance Details for a Reported Security Risk / Vulnerability?
To review specific instance details of a reported security risk or vulnerability, the RHL ASM Platform provides a categorized and detailed view within the Security Risks module.
📄️ Where Can I Find Notifications in RHL ASM Platform?
Profile Menu (bottom-left)